• Title/Summary/Keyword: cyber training

Search Result 226, Processing Time 0.028 seconds

Intrusion Detection Method Using Unsupervised Learning-Based Embedding and Autoencoder (비지도 학습 기반의 임베딩과 오토인코더를 사용한 침입 탐지 방법)

  • Junwoo Lee;Kangseok Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.8
    • /
    • pp.355-364
    • /
    • 2023
  • As advanced cyber threats continue to increase in recent years, it is difficult to detect new types of cyber attacks with existing pattern or signature-based intrusion detection method. Therefore, research on anomaly detection methods using data learning-based artificial intelligence technology is increasing. In addition, supervised learning-based anomaly detection methods are difficult to use in real environments because they require sufficient labeled data for learning. Research on an unsupervised learning-based method that learns from normal data and detects an anomaly by finding a pattern in the data itself has been actively conducted. Therefore, this study aims to extract a latent vector that preserves useful sequence information from sequence log data and develop an anomaly detection learning model using the extracted latent vector. Word2Vec was used to create a dense vector representation corresponding to the characteristics of each sequence, and an unsupervised autoencoder was developed to extract latent vectors from sequence data expressed as dense vectors. The developed autoencoder model is a recurrent neural network GRU (Gated Recurrent Unit) based denoising autoencoder suitable for sequence data, a one-dimensional convolutional neural network-based autoencoder to solve the limited short-term memory problem that GRU can have, and an autoencoder combining GRU and one-dimensional convolution was used. The data used in the experiment is time-series-based NGIDS (Next Generation IDS Dataset) data, and as a result of the experiment, an autoencoder that combines GRU and one-dimensional convolution is better than a model using a GRU-based autoencoder or a one-dimensional convolution-based autoencoder. It was efficient in terms of learning time for extracting useful latent patterns from training data, and showed stable performance with smaller fluctuations in anomaly detection performance.

The Effect of Franchisor's On-going Support Services on Franchisee's Relationship Quality and Business Performance in the Foodservice Industry (외식 프랜차이즈 가맹본부의 사후 지원서비스가 가맹점의 관계품질과 경영성과에 미치는 영향)

  • Lee, Jae-Han;Lee, Yong-Ki;Han, Kyu-Chul
    • Journal of Distribution Research
    • /
    • v.15 no.3
    • /
    • pp.1-34
    • /
    • 2010
  • Introduction The purpose of this research is to develop overall model which involves the effect of ongoing support services by franchisor on franchisee's relationship quality(trust, satisfaction, and commitment) and business performance(financial and non-financial performance), and to investigate the relationships among trust, satisfaction, commitment, financial and non-financial performance. This study also suggests franchise business or franchise system should be based on long-term orientation between franchisor and franchisee rather than short-term orientation, or transactional relationship, and proposes the most effective way of providing on-going support services by franchisor with franchisee thru symbiotic relationship among franchisor and franchisee Research Model and Hypothesis The research model as Figure 1 shows the variables on-going support services which affect the relationship quality between franchisor and franchisee such as trust, satisfaction, and commitment, and also analyze the effects of relationship quality on business performance including financial and non-financial performance We established 12 hypotheses to test as follows; Relationship between on-going support services and trust H1: On-going support services factors (product category & price, logistics service, promotion, information providing & problem solving capability, supervisor's support, and education & training support) have positive effect on franchisee's trust. Relationship between on-going support services and satisfaction H2: On-going support services factors (product category & price, logistics service, promotion, information providing & problem solving capability, supervisor's support, and education & training support) have positive effect on franchisee's satisfaction. Relationship between on-going support services and commitment H3: On-going support services factors (product category & price, logistics service, promotion, information providing & problem solving capability, supervisor's support, and education & training support) have positive effect on franchisee's commitment. Relationship among relationship quality: trust, satisfaction, and commitment H4: Franchisee's trust has positive effect on franchisee's satisfaction. H5: Franchisee's trust has positive effect on franchisee's commitment. H6: Franchisee's satisfaction has positive effect on franchisee's commitment. Relationship between relationship quality and business performance H7: Franchisee's trust has positive effect on franchisee's financial performance. H8: Franchisee's trust has positive effect on franchisee's non-financial performance. H9: Franchisee's satisfaction has positive effect on franchisee's financial performance. H10: Franchisee's satisfaction has positive effect on franchisee's non-financial performance. H11: Franchisee's commitment has positive effect on franchisee's financial performance. H12: Franchisee's commitment has positive effect on franchisee's non-financial performance. Method The on-going support services were defined as an organized system of continuous supporting services by franchisor for the purpose of satisfying the expectation of franchisee based on long-term orientation and classified into six constructs such as product category & price, logistics service, promotion, providing information & problem solving capability, supervisor's support, and education & training support. The six constructs were measured agreement using a 7-point Likert-type scale (1 = strongly disagree to 7 = strongly agree)as follows. The product category & price was measured by four items: menu variety, price of food material provided by franchisor, and support for developing new menu. The logistics service was measured by six items: distribution system of franchisor, return policy for provided food materials, timeliness, inventory control level of franchisor, accuracy of order, and flexibility of emergency order. The promotion was measured by five items: differentiated promotion activities, brand image of franchisor, promotion effect such as customer increase, long-term plan of promotion, and micro-marketing concept in promotion. The providing information & problem solving capability was measured by information providing of new products, information of competitors, information of cost reduction, and efforts for solving problems in franchisee's operations. The supervisor's support was measured by supervisor operations, frequency of visiting franchisee, support by data analysis, processing the suggestions by franchisee, diagnosis and solutions for the franchisee's operations, and support for increasing sales in franchisee. Finally, the of education & training support was measured by recipe training by specialist, service training for store people, systemized training program, and tax & human resources support services. Analysis and results The data were analyzed using Amos. Figure 2 and Table 1 present the result of the structural equation model. Implications The results of this research are as follows: Firstly, the factors of product category, information providing and problem solving capacity influence only franchisee's satisfaction and commitment. Secondly, logistic services and supervising factors influence only trust and satisfaction. Thirdly, continuing education and training factors influence only franchisee's trust and commitment. Fourthly, sales promotion factor influences all the relationship quality representing trust, satisfaction, and commitment. Fifthly, regarding relationship among relationship quality, trust positively influences satisfaction, however, does not directly influence commitment, but satisfaction positively affects commitment. Therefore, satisfaction plays a mediating role between trust and commitment. Sixthly, trust positively influence only financial performance, and satisfaction and commitment influence positively both financial and non-financial performance.

  • PDF

A Study on the Improvement of Cadastral Surveying Fee System Applied to Individual Public Land Price (지적측량수수료의 개별공시지가 적용 개선방안)

  • Oh, Chang-Seok
    • Journal of Cadastre & Land InformatiX
    • /
    • v.44 no.1
    • /
    • pp.79-96
    • /
    • 2014
  • This study presents the two major problems and those improvements of Cadastral Surveying Fee System. The system has been attempted to apply for Individual Public Land Price since 2011. To tackle those problems, this study examines a variety of literatures such as specialty publications, academic thesis, and reports from government. This study applies questionnaire survey method. And the data were collected by the personnel in charge of receiving cadastral surveying application in Gwangju and Jellanamdo branch, LX Korea Cadastral Survey Corp. In order to apply Individual Public Land Price to Cadastral Surveying Fee System, this study suggests subdivision of land at price and application of sample lot and land price standard index table. A number of curriculums provided by training institute in LX Korea Cadastral Survey Corp., education materials and cyber education method are necessary to promote awareness of personnel in charge. Publicity activities are also required to fulfill governmental basis.

Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis (교차영향분석을 이용한 국내 ICT 융합산업의 정보보호정책 우선순위 분석)

  • Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.695-706
    • /
    • 2018
  • In recent years, industrial convergence centered on ICBM (internet of things (IoT), cloud, big data, mobile) has been experiencing rapid development in various fields such as agriculture and the financial industry. In order to prepare for cyber threats, one of the biggest problems facing the convergence industry in the future, the development of the industry must proceed in tandem with a framework of information security. In this study, we analyze the details of the current industrial development policy and related information protection policies using cross impact analysis and present policy priorities through the expert questionnaire. The aim of the study was to clarify the priorities and interrelationships within information security policy as a first step in suggesting effective policy direction. As a result, all six information security policy tasks derived from this study belong to key drivers. Considering the importance of policies, policies such as improving the constitution of the security industry and strengthening of support, training of information protection talent, and investing in the information security industry need to be implemented relatively first.

The Study on the Subjective Conceptualization of Social Work Professional to Consumerism in Social Welfare for the Disabled (장애인복지 소비자주의에 대한 사회복지전문직의 주관적 개념화 분석)

  • Park, Kyung-Su
    • Korean Journal of Social Welfare
    • /
    • v.58 no.4
    • /
    • pp.169-196
    • /
    • 2006
  • As social work practice for the disabled is still centered in provider's perspective in Korea, this study started with concerns for consumerism that is emerging as an alternative for the social work practice for the disabled. Consumerism is rooted in organization process of the disability rights movement, and considered as an ideology that protects actively the rights and influence of consumers. However, consumerism is not operating as an accomplished ideology yet, but as a type of the practical discourse. Consumerism is interpreted in multiaxial meanings and the conscituents of consumerism is used ambiguously in practice. This is because theoretical reviews on the conceptual thinking of consumerism are scant and empirical inquiries into conceptual cognition of social workers who uses this concept as a professional are scarce. After analyzing the data using Q methodology, the result shows that social workers' major cognitive types on consumerism perspective consists of four types; Empowerment type, Market-mechanism type, Multi-opening type and Traditional-value type. These types are classified by the dimension of 'specific/extended', 'traditional/reformative' and 'instrumental/autotelic'. This result will attribute to develop consumer-intimate policy, practice program and professional training program and to give facilities for lucid communication among policy, practice field, theory and movement in social welfare for disabled as it materializes the explicit conception of consumerism that is understood ambiguously in Korea.

  • PDF

Speaker Identification Using Dynamic Time Warping Algorithm (동적 시간 신축 알고리즘을 이용한 화자 식별)

  • Jeong, Seung-Do
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2402-2409
    • /
    • 2011
  • The voice has distinguishable acoustic properties of speaker as well as transmitting information. The speaker recognition is the method to figures out who speaks the words through acoustic differences between speakers. The speaker recognition is roughly divided two kinds of categories: speaker verification and identification. The speaker verification is the method which verifies speaker himself based on only one's voice. Otherwise, the speaker identification is the method to find speaker by searching most similar model in the database previously consisted of multiple subordinate sentences. This paper composes feature vector from extracting MFCC coefficients and uses the dynamic time warping algorithm to compare the similarity between features. In order to describe common characteristic based on phonological features of spoken words, two subordinate sentences for each speaker are used as the training data. Thus, it is possible to identify the speaker who didn't say the same word which is previously stored in the database.

A Study on the Subjective Perception Patterns of Social Workers to Corporate Philanthropy in Social Work Field (사회복지분야의 기업 사회공헌활동에 대한 사회복지사의 주관적 인식유형 연구)

  • Park, Kyung-Su
    • Korean Journal of Social Welfare
    • /
    • v.61 no.4
    • /
    • pp.109-136
    • /
    • 2009
  • This study started with concerns for corporate philanthropy that is emerging as an alternative for resource development of social work field in Korea. However, corporate philanthropy is not operating as an accomplished conception yet, but as a type of the practical discourse. Therefore corporate philanthropy is interpreted a multiplicity of meanings is used ambiguously in social work practice field. This is because theoretical reviews on the conceptual thinking of corporate philanthropy are scant and is in need of empirical inquires into conceptual perception of social workers who uses this concept as a stakeholder to corporate philanthropy. After analyzing the data using Q methodology, the result shows that social workers' major perception patterns on corporate philanthropy perspective consists of three patterns; Win-Win Partnership, Social-obligation, Strategic Materialism. These patterns are classified by the dimension of 'classical view', 'socio-economic view', 'modern view' and 'philanthrophic view'. This result will attribute to develop theories, social work practice program and social worker' training program related corporate philanthropy. And to give facilities for lucid communication among practice and theory in social work field as it materializes the explicit conception of corporate philanthropy that is understood ambiguously in Korea.

  • PDF

Security Education Training Program Characteristics needed to Development Task of Security Software in Security Majors of 5 Universities of Seoul Region (서울지역 5개 대학 보안 전공들의 보안소프트웨어의 개발 직무에 필요한 보안 교육 훈련 프로그램 특성)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.16-22
    • /
    • 2020
  • In this paper, the technology and capabilities required for the job of developing security software recommended by the Cybersecurity Human Resources Development Framework of the National Initiative for Cybersecurity Education (NICE) were studied. In this paper, we describe what security skills are needed for the task of developing security software and what security capabilities should be held. The focus of this paper is to analyze the consistency between security technologies (core and specialized technologies) required for security software development tasks and the curriculum of information protection-related departments located in Seoul, Korea. The reason for this analysis is to see how the curriculum at five universities in Seoul is suitable for performing security software development tasks. In conclusion, if the five relevant departments studied are to intensively train developers of development tasks for security software, they are commonly required to train security testing and software debugging, how secure software is developed, risk management, privacy and information assurance.

A Study of the Performance of Virtual Education Systems (가상교육 지원 시스템 성능에 관한 연구)

  • Lee, Young-Houn;Kang, Seong-Guk;Kim, Myeong-Ryeol
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.1
    • /
    • pp.77-85
    • /
    • 2001
  • The virtual education has extended its position as a new educational mean in the whole society. A lot of cyber campuses like the virtual training institutes and the remote colleges were newly formed. With the development of the technology related to the Internet, new systems that support smooth virtual education have appeared. But the systems that had no problems at first became low speed gradually with the increase of the learners and contents and there arose a lot of problems. The problems can be solved through upgrading the hardware equipments, but it needs a lot of expenses and there always exists waste of unnecessary system resources. Accordingly, this study is to test the performance of the server through the simulation under various situations and investigate the plan for improvement in order to grope for the plan that can improve the performance of the virtual education systems. It is fragmentary simulation. But if we would like to correct the server programs and complement it on the basis of these plans for improvement, we may expect the sufficient improvement of performance. Also it may have sufficient values as data for smooth virtual education.

  • PDF

Adaptive Keystroke Authentication Method for Online Test (온라인 시험을 위한 적응적 키보드 인증방법)

  • Ko, Joo-Young;Shim, Jae-Chang;Kim, Hyen-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.8
    • /
    • pp.1129-1137
    • /
    • 2008
  • E-learning as a new education trend is being applied not only to cyber school but also various education fields such as employee training for companies or interactive learning for consumers. Users of the E-learning can take online tests individually anywhere, to evaluate their achievement level. Because users who are taking the online tests may show their own IDs or passwords to others, the possibility of cheating is very high. Therefore, it is very important to authenticate the users. In this paper, we propose an adaptive-keyboard authentication method which depends on user behavior patterns through the use of IDs and passwords. This method does not need any additional devices or special effort. An adaptive method to update patterns in which IDs and passwords are entered was previously suggested and this new method has proved to be better than previous methods through simulations and implementation.

  • PDF